Description
Book SynopsisA collection that details how to conduct digital investigations in both criminal and civil contexts, and how to locate and utilize digital evidence on computers, networks, and embedded systems. It provides guidance in the three main areas of practice: Forensic Analysis, Electronic Discovery and Intrusion Investigation.
Trade Review"... any library serving them would find this an excellent introduction." --E-Streams"Any law firm looking to get into the field would do well to start here." --E-Streams"... a useful introduction to an increasingly important field." --E-Streams
Table of ContentsChapter 1. IntroductionEoghan CaseyPart 1: Investigative MethodologyChapter 2. Forensic AnalysisEoghan Casey and Curtis W. RoseChapter 3. Electronic DiscoveryJames Holley, Paul Luehr, Jessica Reust Smith and Joseph SchwerhaChapter 4. Intrusion InvestigationEoghan Casey, Christopher Daywalt and Andy JohnstonPart 2: TechnologyChapter 5. Windows Forensic AnalysisRyan Pittman and Dave ShaverChapter 6. UNIX Forensic AnalysisCory Altheide and Eoghan CaseyChapter 7. Macintosh Forensic AnalysisAnthony KokocinskiChapter 8. Embedded Systems AnalysisRonald van der KnijffChapter 9: Handbook Network InvestigationsEoghan Casey, Christopher Daywalt, Andy Johnston, Terrance MaguireChapter 10. Mobile Network InvestigationsDario Forte and Andrea De Donno